Methods and apparatus to improve security of a virtual private mobile network
First Claim
1. A method to prevent consecutive attacks on a virtual private mobile network, the method comprising:
- for each of a plurality of network elements;
generating, with a hardware processor, virtualized slices based on a virtualized slice count value for subgroups associated with the virtual private mobile network, the virtualized slice count based on a multiplication factor associated with a number of subgroups defined within the virtual private mobile network, wherein the number of subgroups is at least two;
determining a demand for the virtualized slices by at least one of a number of expected users of one or more of the subgroups, a number of expected mobile devices that will use one or more of the subgroups, or an expected bandwidth to be used by one or more of the subgroups;
preventing consecutive attacks on the virtualized slices of the virtual private mobile network by assigning non-consecutive ones of the virtualized slices to the subgroups associated with the virtual private mobile network based on the demand for the virtualized slices by the respective ones of the subgroups; and
in response to a request from a mobile device to access the virtual private mobile network for a first time, assigning the mobile device to one of the virtual slices of the plurality of network elements based on (i) the subgroup associated with the mobile device, and (ii) availability of the virtual slices.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus are disclosed to prevent consecutive attacks on a virtual private mobile network. An example method includes for each of a plurality of network elements, generating virtualized slices based on a virtualized slice count value for subgroups associated with the virtual private mobile network, and assigning non-consecutive ones of the virtualized slices to the subgroups associated with the virtual private mobile network based on demand for the virtualized slices by the respective ones of the subgroups. The example method also includes, in response to a request from a mobile device to access the virtual private mobile network for a first time, assigning the mobile device to one of the virtual slices of the plurality of network elements based on (i) the subgroup associated with the mobile device, and (ii) availability of the virtual slices.
63 Citations
15 Claims
-
1. A method to prevent consecutive attacks on a virtual private mobile network, the method comprising:
-
for each of a plurality of network elements; generating, with a hardware processor, virtualized slices based on a virtualized slice count value for subgroups associated with the virtual private mobile network, the virtualized slice count based on a multiplication factor associated with a number of subgroups defined within the virtual private mobile network, wherein the number of subgroups is at least two; determining a demand for the virtualized slices by at least one of a number of expected users of one or more of the subgroups, a number of expected mobile devices that will use one or more of the subgroups, or an expected bandwidth to be used by one or more of the subgroups; preventing consecutive attacks on the virtualized slices of the virtual private mobile network by assigning non-consecutive ones of the virtualized slices to the subgroups associated with the virtual private mobile network based on the demand for the virtualized slices by the respective ones of the subgroups; and in response to a request from a mobile device to access the virtual private mobile network for a first time, assigning the mobile device to one of the virtual slices of the plurality of network elements based on (i) the subgroup associated with the mobile device, and (ii) availability of the virtual slices. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus to prevent consecutive attacks on a virtual private mobile network, the apparatus comprising:
-
a processor; and a memory including instructions that, when executed, cause the processor to; for each of a plurality of network elements; generate virtualized slices based on a virtualized slice count value for subgroups associated with the virtual private mobile network, the virtualized slice count based on a multiplication factor associated with a number of subgroups defined within the virtual private mobile network, wherein the number of subgroups is at least two; determine a demand for the virtualized slices by at least one of a number of expected users of one or more of the subgroups, a number of expected mobile devices that will use one or more of the subgroups, or an expected bandwidth to be used by one or more of the subgroups; prevent consecutive attacks on the virtualized slices of the virtual private mobile network by assigning non-consecutive ones of the virtualized slices to the subgroups associated with the virtual private mobile network based on the demand for the virtualized slices by the respective ones of the subgroups; and in response to a request from a mobile device to access the virtual private mobile network for a first time, assigning the mobile device to one of the virtual slices of the plurality of network elements based on (i) the subgroup associated with the mobile device, and (ii) availability of the virtual slices. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A machine accessible storage device comprising instructions that, when executed, cause a machine to, at least:
-
for each of a plurality of network elements; generate virtualized slices based on a virtualized slice count value for subgroups associated with the virtual private mobile network, the virtualized slice count based on a multiplication factor associated with a number of subgroups defined within the virtual private mobile network, wherein the number of subgroups is at least two; determine a demand for the virtualized slices by at least one of a number of expected users of one or more of the subgroups, a number of expected mobile devices that will use one or more of the subgroups, or an expected bandwidth to be used by one or more of the subgroups; prevent consecutive attacks on the virtualized slices of the virtual private mobile network by assigning non-consecutive ones of the virtualized slices to the subgroups associated with the virtual private mobile network based on the demand for the virtualized slices by the respective ones of the subgroups; and in response to a request from a mobile device to access the virtual private mobile network for a first time, assign the mobile device to one of the virtual slices of the plurality of network elements based on (i) the subgroup associated with the mobile device, and (ii) availability of the virtual slices. - View Dependent Claims (12, 13, 14, 15)
-
Specification